Sciweavers

7853 search results - page 1439 / 1571
» Learning from Each Other
Sort
View
SENSYS
2004
ACM
14 years 2 months ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
14 years 2 months ago
Effective features of algorithm visualizations
Many algorithm visualizations have been created, but little is known about which features are most important to their success. We believe that pedagogically useful visualizations ...
Purvi Saraiya, Clifford A. Shaffer, D. Scott McCri...
CSB
2003
IEEE
130views Bioinformatics» more  CSB 2003»
14 years 2 months ago
Latent Structure Models for the Analysis of Gene Expression Data
Cluster methods have been successfully applied in gene expression data analysis to address tumor classification. By grouping tissue samples into homogeneous subsets, more systema...
Dong Hua, Dechang Chen, Xiuzhen Cheng, Abdou Youss...
SIGIR
2003
ACM
14 years 2 months ago
ReCoM: reinforcement clustering of multi-type interrelated data objects
Most existing clustering algorithms cluster highly related data objects such as Web pages and Web users separately. The interrelation among different types of data objects is eith...
Jidong Wang, Hua-Jun Zeng, Zheng Chen, Hongjun Lu,...
ICANN
2003
Springer
14 years 2 months ago
The Acquisition of New Categories through Grounded Symbols: An Extended Connectionist Model
Abstract. Solutions to the symbol grounding problem, in psychologically plausible cognitive models, have been based on hybrid connectionist/symbolic architectures, on robotic appro...
Alberto Greco, Thomas Riga, Angelo Cangelosi
« Prev « First page 1439 / 1571 Last » Next »